Telecommunications network access rejection
First Claim
1. A method of controlling an attach procedure of a device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the method comprising:
- assessing authenticity of the attach rejection by determining whether there is a trust relationship between the device and the network that existed prior to the attach request;
determining a length of a time period that must expire before performance of a subsequent attach attempt by the device to the network is permitted unless a particular event occurs within the time period, wherein the length of the time period is determined in dependence upon the authenticity assessment, wherein the length of the time period is increased in response to the rejection being deemed authentic and wherein the length of the time period further depends upon a number of prior attach rejections of the device from the telecommunications network; and
performing the subsequent attach attempt in response to at least one of;
(i) expiration of the time period;
or(ii) occurrence of the particular event within the time period, wherein the particular event includes at least one of;
power cycling of the device or a minimum threshold movement in location of the device.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of controlling an attach procedure of a device 1 to a telecommunications network 140 following receipt of an attach rejection from the telecommunications network, the method including assessing the authenticity of the attach rejection, and selecting a criterion for performing a subsequent attach attempt by the device to the network in dependence upon the authenticity assessment. The authenticity may be assessed by determining whether the rejection was received by an authenticated communication link or a signed message. The authenticity may also be assessed by checking that the cause of the reject is consistent with information held by the device. The selected criterion may be power cycling of the device or the passage of a time period.
-
Citations
12 Claims
-
1. A method of controlling an attach procedure of a device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the method comprising:
-
assessing authenticity of the attach rejection by determining whether there is a trust relationship between the device and the network that existed prior to the attach request; determining a length of a time period that must expire before performance of a subsequent attach attempt by the device to the network is permitted unless a particular event occurs within the time period, wherein the length of the time period is determined in dependence upon the authenticity assessment, wherein the length of the time period is increased in response to the rejection being deemed authentic and wherein the length of the time period further depends upon a number of prior attach rejections of the device from the telecommunications network; and performing the subsequent attach attempt in response to at least one of; (i) expiration of the time period;
or(ii) occurrence of the particular event within the time period, wherein the particular event includes at least one of;
power cycling of the device or a minimum threshold movement in location of the device. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A system for controlling an attach procedure of a telecommunications device to a telecommunications network following receipt of an attach rejection from the telecommunications network, the system comprising:
-
an assessment device that assesses authenticity of the attach rejection by determining whether there is a trust relationship between the device and the network that existed prior to the attach request; a time period-determining device that determines a length of a time period that must expire before performance of a subsequent attach attempt by the telecommunications device to the network is permitted unless a particular event occurs within the time period, wherein the length of the time period is determined in dependence upon the authenticity assessment, wherein the length of the time period is increased in response to the rejection being deemed authentic, and wherein the length of the time period further depends upon a number of prior attach rejections of the telecommunications device from the telecommunications network; and an attach device that performs the subsequent attach attempt in response to at least one of; (i) expiration of the time period;
or(ii) occurrence of the particular event within the time period, wherein the particular event includes at least one of;
power cycling of the telecommunications device or a minimum threshold movement in location of the telecommunications device. - View Dependent Claims (8, 9, 10, 11, 12)
-
Specification